Just-In-Time Access (JIT)
KeeperPAM Just-In-Time Access and Zero Standing Privilege

Just-In-Time Access and Zero Standing Privilege
Introduction
KeeperPAM provides comprehensive just-in-time (JIT) access capabilities to help organizations achieve zero standing privilege (ZSP) across their entire IT infrastructure and endpoints. By implementing JIT access controls, organizations can significantly reduce their attack surface by ensuring that privileged access is only granted when needed, for the duration required, and with appropriate approvals.
Understanding JIT and ZSP
Just-In-Time (JIT) Access: Provides users with privileged access only at the moment they need it, for a limited time period, and often with approval workflows.
Zero Standing Privilege (ZSP): A security approach where users have no permanent privileged access to systems, eliminating the risk associated with compromised privileged accounts.
Use Cases
KeeperPAM offers JIT capabilities across multiple scenarios:
Just-in-Time Elevated Access to Infrastructure
Keeper's zero-trust privileged sessions can be established to any target with a single click from the web vault. When configured for JIT, elevated privileges are only granted for the duration of the session and automatically revoked upon session termination.
Supported Connection Protocols:
RDP (Remote Desktop Protocol)
SSH (Secure Shell)
VNC (Virtual Network Computing)
HTTP/HTTPS
Database connections (MySQL, PostgreSQL, SQL Server, Oracle, etc.)
How to Configure:
In the KeeperPAM resource configuration, navigate to the "JIT" tab
Enable just-in-time elevated access for the target resource
Configure the elevation settings (Ephemeral account or Group/Role elevation)
Update the configuration
Ephemeral Account Creation
KeeperPAM can create temporary accounts with appropriate privileges that exist only for the duration of a privileged session.
Key Features:
Automatic creation of temporary privileged accounts when sessions begin
Dynamic privilege assignment based on access requirements
Complete account removal when sessions terminate
No persistent privileged accounts to be compromised
Comprehensive logging of all account creation and removal activities
Benefits:
Eliminates attack vectors associated with standing privileged accounts
Prevents lateral movement using compromised credentials
Creates clean audit trails linking specific sessions to temporary accounts
Reduces administrative overhead of managing privileged accounts
The Keeper Gateway is responsible for creating a temporary account on the target using the selected account type.

Keeper can create temporary accounts on any assigned target resource, such as:
Active Directory / LDAP User
Windows User
Linux User
MySQL User
PostgreSQL User
Microsoft Server SQL User
Group and Role Elevation
Role elevation can be assigned at the Group or Role level. For example, an AWS group or role can be assigned to the connecting user account for the duration of the session.
In the input field, provide Keeper with the identifier of the group or role to elevate during the connection. E.g. for Windows this might be “Administrators” and for AWS this would be the full ARN (e.g. arn:aws:iam::12345:role/Admin
).

Just-in-Time Elevated Access on Endpoints using PEDM
Keeper Privilege Manager extends JIT capabilities to end-user devices, allowing for precise privilege elevation for specific processes, applications, or tasks without granting full administrative access.
Key Features:
Process-level privilege management across Windows, macOS, and Linux
Policy-based elevation rules with granular controls
User-initiated elevation requests with approval workflows
Comprehensive auditing and reporting
How it Works:
Users operate with standard, non-privileged accounts by default
When administrative privileges are needed, users request elevation for specific tasks
Based on policy, requests are auto-approved or routed for manual approval
Elevated privileges are granted only for the specified process or time window
Full audit trails capture all elevation activities

For more information see:
Time-Limited Access with Automated Credential Rotation
KeeperPAM provides time-bounded access to resources with automatic credential rotation.
Key Features:
Automated credential rotation on-demand or on a scheduled basis
Time-limited access window for authorized users
Integration with password rotation policies
Complete audit trail of credential changes
Security Benefits:
Ensures credentials are never re-used for future sessions
Protects against credential theft during access periods
Creates cryptographically verifiable access boundaries
Maintains compliance with credential rotation requirements
To provide time-limited access to a resource, open the resource from the vault and select Sharing. Add the user as a share recipient, and select Set Expiration.

For more information see:
Workflow and Requests for Approval
The Workflow and Requests for Approval capabilities are Coming Soon
KeeperPAM includes flexible approval workflows for JIT access requests, ensuring proper oversight of privileged access.
Key Features:
Multi-level approval workflows
Time-based auto-approval or denial
Delegation of approval authority
Email and mobile notifications
Detailed justification requirements
Single-user mode (Check-in / Check-out)
MFA enforcement on access
Configuration Options:
Required approvers based on resource sensitivity
Approval timeouts and escalations
Working hours restrictions
Maximum session duration settings
User-specific approval requirements

Implementation Best Practices
When implementing JIT access and ZSP with KeeperPAM:
Start with critical systems: Begin your implementation with your most sensitive systems and infrastructure
Define clear policies: Establish clear guidelines for when JIT access is required and who can approve it
Educate users: Ensure users understand how to request elevated access when needed
Monitor and adjust: Regularly review logs and adjust policies based on actual usage patterns
Plan for emergencies: Establish break-glass procedures for critical situations where normal approval workflows may be too slow
Conclusion
KeeperPAM's comprehensive JIT and ZSP capabilities provide organizations with the tools needed to significantly reduce their privileged access attack surface. By implementing these capabilities across your infrastructure, you can ensure that privileged access is strictly controlled, properly approved, and thoroughly audited.
For more information on specific JIT use cases or implementation guidance, contact your Keeper Security account manager or email pam@keepersecurity.com.
Last updated
Was this helpful?